McqMate
101. |
In the right setting a thief will steal your information by simply watching what you type. |
A. | snagging |
B. | spying |
C. | social engineering |
D. | shoulder surfing |
E. | None of these |
Answer» D. shoulder surfing |
102. |
A………..is a small program embedded inside of a GIF image. |
A. | web bug |
B. | cookie |
C. | spyware application |
D. | spam |
E. | None of these |
Answer» A. web bug |
103. |
A hacker contacts you my phone or email and attempts to acquire your password |
A. | spoofing |
B. | phishing |
C. | spamming |
D. | bugging |
E. | None of these |
Answer» B. phishing |
104. |
A hacker that changes or forges information in an electronic resource, is engaging in……… |
A. | denial of service |
B. | sniffing |
C. | terrorism |
D. | data diddling |
E. | None of these |
Answer» D. data diddling |
105. |
Hackers often gain entry to a network be pretending to be at a legitimate computer. |
A. | Spoofing |
B. | forging |
C. | IP spoofing |
D. | ID theft |
E. | None of these |
Answer» C. IP spoofing |
106. |
The………..of a threat measures its potential impact on a system. |
A. | vulnerabilities |
B. | countermeasures |
C. | degree of harm |
D. | susceptibility |
E. | None of these |
Answer» C. degree of harm |
107. |
The power level drops below 120V. |
A. | brownout |
B. | spike |
C. | blackout |
D. | surge |
E. | None of these |
Answer» C. blackout |
108. |
Which of the following is NOT a Microsoft Internet tool or technology? |
A. | Dreamweaver |
B. | Silverlight |
C. | Internet Explorer |
D. | Expression Web |
E. | None of these |
Answer» A. Dreamweaver |
109. |
A protocol used to control the secure sending of data on the internet is : |
A. | SMTP |
B. | HTTPS |
C. | TCP/IP |
D. | HTTP |
E. | None of these |
Answer» B. HTTPS |
110. |
Programs from the same developer sold bundled together, that provide better integration and share common features, toolbars and menus are known as ……….. |
A. | software suites |
B. | integrated software packages |
C. | software processing packages |
D. | personal information managers |
E. | None of these |
Answer» A. software suites |
111. |
……………terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems. |
A. | Data |
B. | Sales |
C. | Query |
D. | Point-of-Sale (POS) |
E. | None of these |
Answer» D. Point-of-Sale (POS) |
112. |
The OSI model is divided into …………processes called layers. |
A. | five |
B. | six |
C. | seven |
D. | eight |
E. | None of these |
Answer» C. seven |
113. |
………..are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat. |
A. | Servers |
B. | Embedded computers |
C. | Robotic computers |
D. | Mainframes |
E. | None of these |
Answer» B. Embedded computers |
114. |
In a ring topology, the computer in possession of the………can transmit data |
A. | packet |
B. | data |
C. | access method |
D. | token |
E. | None of these |
Answer» D. token |
115. |
…………Viruses are often transmitted by a floppy disk left in the floppy drive |
A. | Trojan horse |
B. | Boot sector |
C. | Script |
D. | Logic bomb |
E. | None of these |
Answer» B. Boot sector |
116. |
A database management system (DBMS) is a……….. |
A. | hardware system used to create, maintain and provide controlled access to a database |
B. | hardware system used to create, maintain, and provide uncontrolled access to a database. |
C. | software system used to create, maintain, and provide uncontrolled access to a database. |
D. | software system used to create, maintain, and provide controlled access to a database. |
E. | None o these |
Answer» D. software system used to create, maintain, and provide controlled access to a database. |
117. |
A Proxy server is used for which of the following? |
A. | To provide security against unauthorized users |
B. | To process client requests for web pages |
C. | To process client requests for database access |
D. | To provide TCP/IP |
E. | None of these |
Answer» B. To process client requests for web pages |
118. |
……….are words that a programming language has set aside for its own use. |
A. | Control words |
B. | Reserved words |
C. | Control structures |
D. | Reserved keys |
E. | None of these |
Answer» B. Reserved words |
119. |
What is the primary difference between a virus and a worm? |
A. | A worm has the ability to self-propagate from an infected user’s computer to other computers |
B. | A worm is usually written by a cracker : Script bunnies do not have the skills to develop worm program |
C. | A virus is very harmful to the computers it infects; a worm is not a serious a problem |
D. | Anti-virus software is effective in fighting viruses but not worms |
E. | None of these |
Answer» C. A virus is very harmful to the computers it infects; a worm is not a serious a problem |
120. |
………..describe what is database fields. |
A. | Structures |
B. | Field markers |
C. | Field definition |
D. | Field names |
E. | None of these |
Answer» D. Field names |
121. |
A goal of normalization is to…………. |
A. | minimize the number of relationships |
B. | minimize the number of entities |
C. | minimize the number of tables |
D. | minimize the numbe of redundancy |
E. | None of these |
Answer» D. minimize the numbe of redundancy |
122. |
A(n)………….uses pictures (called icons) and menus displayed on the screen to send commands to the computer system. |
A. | command-based user interface |
B. | GUI |
C. | system utility |
D. | API |
E. | None of these |
Answer» B. GUI |
123. |
Communication using a modulated carrier to apply a data signal to a transmission medium in analog form is |
A. | Local area network |
B. | Modem |
C. | Base band networking |
D. | Broad band networking |
E. | None of these |
Answer» D. Broad band networking |
124. |
‘ITS’ stands for |
A. | Intelligent Teaching Systems |
B. | International Tutoring Systems |
C. | Intelligent Tutoring Systems |
D. | All of these |
E. | None of these |
Answer» C. Intelligent Tutoring Systems |
125. |
Any piece of equipment forming an interface to a data communication system is |
A. | DTE |
B. | DTA |
C. | CSA |
D. | DCA |
E. | None of these |
Answer» B. DTA |
126. |
In the language of the computer profession, one thousand position of main storage is represented with the letter |
A. | K |
B. | L |
C. | M |
D. | C |
E. | None of these |
Answer» A. K |
127. |
The control of the jobs running within a system is |
A. | Job monitoring |
B. | Job stream |
C. | Job min |
D. | Job step |
E. | None of these |
Answer» A. Job monitoring |
128. |
The total number of messages handled by a computerized telephone system on a daily basis is an example of : |
A. | Frequency |
B. | Updating |
C. | Volume |
D. | All of these |
E. | None of these |
Answer» D. All of these |
129. |
A device mounted on a communication satellite which receives, amplifies and re- transmits signals from earth station is |
A. | Track |
B. | Transponder |
C. | Transistor |
D. | Terminal |
E. | None of these |
Answer» B. Transponder |
130. |
What is the acronym for Single In-Line Memory Module? |
A. | SIMM |
B. | SILMM |
C. | SM |
D. | SMM |
E. | None of these |
Answer» A. SIMM |
131. |
Which type of processing that produces output results immediately after input data are entered into a computer system |
A. | Time-sharing |
B. | Interactive |
C. | Batch Processing |
D. | Real-time processing |
E. | None of these |
Answer» B. Interactive |
132. |
A computer program that instructs other programs to perform a particular type of operation is |
A. | System software |
B. | Application program |
C. | Compiler |
D. | Interpreter |
E. | None of these |
Answer» A. System software |
133. |
The provides a path between the CPU and peripheral devices, which are connected via interface cards |
A. | computer |
B. | expansion bus |
C. | memory |
D. | CPU |
E. | None of these |
Answer» B. expansion bus |
134. |
Programs prepared by an outside supplier & provided to a user in a machine readable form is known as |
A. | Utility program |
B. | Canned program |
C. | Application program |
D. | Application software |
E. | None of these |
Answer» B. Canned program |
135. |
Pictures or drawings, typically displayed on a VDU to allow users to select program options is called |
A. | HIPO charts |
B. | Icons |
C. | Graphics |
D. | Network |
E. | None of these |
Answer» B. Icons |
136. |
The pieces of equipment which are attached to the CPU of a computer and which it can access are called |
A. | output devices |
B. | control units |
C. | hardware |
D. | disk drive |
E. | peripherals |
Answer» E. peripherals |
137. |
A factor which might cause an individual to consider using a computer in criminal activities is : |
A. | The computer’s access to large sums of money |
B. | The speed with which the crime can be accomplished |
C. | EFTS (Electronic Funds Transfer System) |
D. | All the these |
E. | None of these |
Answer» D. All the these |
138. |
The Secure Electronic Transaction (SET) specification |
A. | is a notice, issued and verified by a certificate authority, that guarantees a user or Web site is legitimate |
B. | provides private-key encryption of all data that passes between a client and a server |
C. | allows users to choose an encryption scheme for the data that passes between a client and a server |
D. | uses a public-key encryption to secure credit-card transaction systems |
E. | None of these |
Answer» D. uses a public-key encryption to secure credit-card transaction systems |
139. |
‘DOS’ floppy disk does not have |
A. | A Boot Record |
B. | A File Allocation Table |
C. | A Root Directory |
D. | Virtual Memory |
E. | BIOS |
Answer» E. BIOS |
140. |
All the information collected during database development is stored in a_ |
A. | repository |
B. | data warehouse |
C. | RAD |
D. | CASE |
E. | None of these |
Answer» B. data warehouse |
141. |
The…………component is used by the data analyst to create the queries that access the database. |
A. | data extraction |
B. | end-user query tool |
C. | end-user presentation tool |
D. | data store |
E. | None of these |
Answer» B. end-user query tool |
142. |
A polymorphic virus |
A. | modifies its program code each time it attaches itself to another program or file |
B. | is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains. |
C. | a malicious-logic program that hides within or looks like a legitimate program |
D. | infects a program file, but still reports the size and creation date of the original uninfected program |
E. | None of these |
Answer» A. modifies its program code each time it attaches itself to another program or file |
143. |
Microwave transmission is used in environments where installing physical transmission media is _ |
A. | difficult or impossible and where line-of- sight transmission is unavailable |
B. | easy or promising and where line-of-sight transmission is unavailable |
C. | difficult or impossible and where line-of- sight transmission is available |
D. | easy or promising and where line-of-sight transmission is available |
E. | None of these |
Answer» D. easy or promising and where line-of-sight transmission is available |
144. |
Which is NOT a good Web security strategy? |
A. | Restrict access to the Web server; keep a minimum number of ports open |
B. | Limit the users who can load software, edit or add files. |
C. | Add demo programs, so users can test system without accessing production data. |
D. | Remove unnecessary compilers and interpreters |
E. | None of these |
Answer» D. Remove unnecessary compilers and interpreters |
145. |
The word FTP stands for |
A. | File Translate Protocol |
B. | File Transit Protocol |
C. | File Typing Protocol |
D. | File Transfer Protocol |
E. | None of these |
Answer» D. File Transfer Protocol |
146. |
This…………tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data. |
A. | Client |
B. | Applications/Web server |
C. | Enterprise Server |
D. | DBA |
E. | None of these |
Answer» A. Client |
147. |
RSA is |
A. | Symmetric Cryptosystem |
B. | Asymmetric Cryptosystem |
C. | Block Cypher |
D. | Digital Signature |
E. | None of these |
Answer» D. Digital Signature |
148. |
A DVD-RAM is similar to a …………except it has storage capacities upto 5.2 GB. |
A. | CD-R |
B. | floppy disk |
C. | CD-RW |
D. | hard disk |
E. | None of these |
Answer» C. CD-RW |
149. |
How is power supplied to a low-power USB device? |
A. | Through a power cable |
B. | From an external power supply |
C. | Directly from the computer’s power supply |
D. | Through the USB cable |
E. | None of these |
Answer» D. Through the USB cable |
150. |
The………data mining techniques derives rules from real-world case examples. |
A. | Rule discover |
B. | Signal processing |
C. | Neural nets |
D. | Case-based reasoning |
E. | None of these |
Answer» C. Neural nets |
151. |
Which of the following objects is passed to a JavaBean when one of its properties is set via a JSP action? |
A. | Servlet Request |
B. | Http Servlet Request |
C. | Servlet Response |
D. | Http Servlet Response |
E. | None of these |
Answer» C. Servlet Response |
152. |
Graphical diagrams used to represent different multiple perspectives of a system include_ |
A. | use-case, class, and state diagrams |
B. | state, interaction, derivative diagrams |
C. | interaction, relationship, and class diagrams |
D. | deployment, relationship, and use-case diagrams |
E. | None of these |
Answer» A. use-case, class, and state diagrams |
153. |
Database redesign is not terribly difficult if the |
A. | database is structured |
B. | database is well-designed |
C. | database has no data |
D. | database is relatively small |
E. | database is relatively large |
Answer» E. database is relatively large |
154. |
Which of the following are normally used to initialize a computer system’s hardware? |
A. | Bootstrap memory |
B. | Volatile memory |
C. | External mass memory |
D. | Static memory |
E. | Random access memory |
Answer» A. Bootstrap memory |
155. |
If you wanted to locate the hardware address of a local device, which protocol would you use? |
A. | ARP |
B. | RARP |
C. | ICMP |
D. | PING |
E. | PONG |
Answer» A. ARP |
156. |
What is Internet 2? |
A. | A new type of cabling system for Wide Area Networks |
B. | A second local area network that can connect with another online LAN to share access |
C. | A new standard for Internet browsers |
D. | An association to develop advanced Internet technology |
E. | None of these |
Answer» D. An association to develop advanced Internet technology |
157. |
While searching a website, you have been unable to find information that was on the site several months ago. What might you do to attempt to locate that information? |
A. | Visit Google’s cached page to view the older copy. |
B. | Forget about it, as there is no way to find this information |
C. | Visit a partner site of the organization to see if it is there. |
D. | Use the wayback machine. |
E. | None of these |
Answer» C. Visit a partner site of the organization to see if it is there. |
158. |
Which kind of lock includes a keypad that can be used to control access into areas? |
A. | Cipher |
B. | Warded |
C. | Device |
D. | Tumbler |
E. | Typelock |
Answer» D. Tumbler |
159. |
Which is not a factor when categorizing a computer? |
A. | Speed of the output device |
B. | Amount of main memory the CPU can use |
C. | Cost of the system |
D. | Capacity of the hard disk |
E. | Where it was purchased |
Answer» E. Where it was purchased |
160. |
Which of the following terms is the most closely related to main memory? |
A. | nonvolatile |
B. | permanent |
C. | control unit |
D. | temporary |
E. | None of these |
Answer» D. temporary |
161. |
Which of the following is not a factor affecting the processing capability or performance of a PC system? |
A. | The clock speed of the microprocessor |
B. | The revolutions per minute of the printer disk |
C. | The primary storage capacity of the processor |
D. | The built-in instruction set available to the microprocessor |
E. | None of these |
Answer» B. The revolutions per minute of the printer disk |
162. |
What is the standard code the computer industry created to represent characters? |
A. | DASI |
B. | ASSH |
C. | ASCII |
D. | BASCII |
E. | EPROM |
Answer» C. ASCII |
163. |
Primary storage is………..as compared to secondary storage : |
A. | Slow and inexpensive |
B. | Fast and inexpensive |
C. | Fast and expensive |
D. | Slow and expensive |
E. | None of these |
Answer» C. Fast and expensive |
164. |
Offline device is : |
A. | a device which is not connected to CPU |
B. | a device which i connected to CPU |
C. | a direct access storage device |
D. | an I/O device |
E. | None of these |
Answer» A. a device which is not connected to CPU |
165. |
The most popular language used with microcomputers and time-shared mini computers, is an easy-to-use high level language : |
A. | COBOL |
B. | ADA |
C. | PASCAL |
D. | BASIC |
E. | None of these |
Answer» D. BASIC |
166. |
Which of the following is a communication network that is devoted to carrying computer information : |
A. | Data Point |
B. | Data Module |
C. | Data network |
D. | Data Pack |
E. | None of these |
Answer» C. Data network |
167. |
A half byte is known as : |
A. | Data |
B. | Bit |
C. | Half byte |
D. | Nibble |
E. | None of these |
Answer» D. Nibble |
168. |
With respect to a network interface card the term 10/100 refers to: |
A. | protocol speed |
B. | a fiber speed |
C. | megabits per seconds |
D. | minimum and maximum server speed |
E. | None of these |
Answer» C. megabits per seconds |
169. |
A hard disk is divided into tracks which are further subdivided into : |
A. | clusters |
B. | sectors |
C. | vectors |
D. | heads |
E. | None of these |
Answer» B. sectors |
170. |
Which standard govern parallel communications? |
A. | RS232 |
B. | RS-232a |
C. | CAT 5 |
D. | IEEE 1284 |
E. | None of these |
Answer» D. IEEE 1284 |
171. |
Which peripheral port provides the FASTEST throughput to laser printers? |
A. | RS-232 |
B. | SCSI |
C. | Parallel |
D. | Serial |
E. | None of these |
Answer» C. Parallel |
172. |
Resistance is measured in? |
A. | Volts |
B. | Amps |
C. | Watts |
D. | Ohms |
E. | None of these |
Answer» D. Ohms |
173. |
In Inkjet technology the droplets of ink are deflected by? |
A. | multi directional nozzles |
B. | electronically charged plates |
C. | high pressure plates |
D. | electro static absorbtion |
E. | None of these |
Answer» A. multi directional nozzles |
174. |
Which provides the fastest access to large video files? |
A. | Optical drives |
B. | IDE hard drives |
C. | SCSI hard drives |
D. | EIDE hard drives |
E. | None of these |
Answer» C. SCSI hard drives |
175. |
Primary memory stores : |
A. | Data alone |
B. | Programs alone |
C. | Results alone |
D. | All of these |
E. | None of these |
Answer» D. All of these |
176. |
You just installed a new IDE hard drive, but your system BIOS will not recognize the new drive, what should you check first : |
A. | cable sequence |
B. | jumpers on the hard drive |
C. | drivers that need to be loaded |
D. | hard drive manufacturer web site information |
E. | None of these |
Answer» B. jumpers on the hard drive |
177. |
What’s the best way to protect your hard drive data? |
A. | regular backups |
B. | periodically defrag it |
C. | run chkdsk at least once a week |
D. | run scandisk at least once a week |
E. | run a regular diagnostic |
Answer» A. regular backups |
178. |
Laser Jet printer speeds are measured in pages per minute (ppm) what do we use to measure dot-matrix printers? |
A. | lines per inch |
B. | lines per sheet |
C. | characters per inch |
D. | characters per second |
E. | None of these |
Answer» D. characters per second |
179. |
A modem could be attached to which port? |
A. | Parallel port |
B. | ASYNC port |
C. | Keyboard connector |
D. | Video port |
E. | None of these |
Answer» A. Parallel port |
180. |
You get a CMOS checksum error during bootup. What is most likely the cause? |
A. | power supply is bad |
B. | BIOS needs updating |
C. | CMOS battery is nearing end of life |
D. | hard drive types are incorrectly defined |
E. | None of these |
Answer» C. CMOS battery is nearing end of life |
181. |
What are the four key functions of a computer system? |
A. | input, processing, output, and storage |
B. | keyboard, display, memory, and disk drive |
C. | word processing, spreadsheets, database, calculations |
D. | bits, bytes, words, and OSI |
E. | None of these |
Answer» A. input, processing, output, and storage |
182. |
Parity is : |
A. | a byte stored in the FAT to indicated remaining slots |
B. | the optimal transmission speed of data over a CAT 5 cable |
C. | an extra bit stored with data in RAM that is used to check for errors when the data is read back |
D. | the optimal transmission speed of data over a CAT 5 cable |
E. | None of these |
Answer» C. an extra bit stored with data in RAM that is used to check for errors when the data is read back |
183. |
What is different between AT and ATX power supplies? |
A. | They are identical except for their shape. |
B. | AT supplies use a single P1 power connector while ATX uses P8 and P9 |
C. | AT supplies use P8 and P9 power connectors while ATX uses a single P1 connector. |
D. | AT power supplies run on 120V AC current while ATX uses 220V AC |
E. | None of these |
Answer» C. AT supplies use P8 and P9 power connectors while ATX uses a single P1 connector. |
184. |
What type of connector is used to plug a telephone line into a modem? |
A. | COM1 |
B. | RJ-11 |
C. | RJ-45 |
D. | RJ-10 |
E. | None of these |
Answer» B. RJ-11 |
185. |
Which of the following is NOT a type of computer hard drive? |
A. | IDE |
B. | FDD |
C. | SCSI |
D. | EIDE |
E. | SATA |
Answer» B. FDD |
186. |
What does FDISK do? |
A. | performs low-level formatting of the hard drive |
B. | fixes bad sectors on the hard drive |
C. | recovers lost clusters on the hard drive |
D. | creates partitions on the hard drive |
E. | None of these |
Answer» D. creates partitions on the hard drive |
187. |
Which of the following is NOT a type of motherboard expansion slot? |
A. | ISA |
B. | PCI |
C. | AGP |
D. | ATX |
E. | None of these |
Answer» D. ATX |
188. |
Copying a process from memory to disk to allow space for other processes is called : |
A. | Swapping |
B. | Deadlock |
C. | Demand Paging |
D. | Page Fault |
E. | None of these |
Answer» A. Swapping |
189. |
Which of the following memory unit that processor can access more rapidly : |
A. | Main Memory |
B. | Virtual Memory |
C. | Cache Memory |
D. | Read Only Memory |
E. | None of these |
Answer» C. Cache Memory |
190. |
Which one of the following is not the function of Operating System? |
A. | Resource Management |
B. | File Management |
C. | Networking |
D. | Processor Management |
E. | None of these |
Answer» C. Networking |
191. |
What is the meaning of “Hibernate” in Windows XP/Windows7? |
A. | Restart the Computer is safe mode |
B. | Restart the Computer in hibernate mode |
C. | Shutdown the Computer terminating all the running applications |
D. | Shutdown the Computer without closing the running applications |
E. | None of these |
Answer» D. Shutdown the Computer without closing the running applications |
192. |
Unix Operating System is an : |
A. | Multi User Operating System |
B. | Time Sharing Operating System |
C. | Multi Tasking Operating System |
D. | All of these |
E. | None of these |
Answer» D. All of these |
193. |
What should be the extension to execute files? |
A. | EXE |
B. | BAT |
C. | COM |
D. | All of these |
E. | None of these |
Answer» D. All of these |
194. |
Which of the following memories need refresh? |
A. | SRAM |
B. | DRAM |
C. | COM |
D. | All of these |
E. | None of these |
Answer» B. DRAM |
195. |
RJ45 UTP cable has………Cable : |
A. | 2 pair |
B. | 3 pair |
C. | 4 pair |
D. | 5 pair |
E. | None of these |
Answer» C. 4 pair |
196. |
Basic is……….language : |
A. | a procedural |
B. | an object oriented |
C. | user friendly |
D. | both A and B |
E. | None of these |
Answer» A. a procedural |
197. |
The file system “NTFS” stands for : |
A. | New Type File System |
B. | Never Terminated File System |
C. | New Technology File System |
D. | Non Terminated File System |
E. | None of these |
Answer» C. New Technology File System |
198. |
Which Operating System doesn’t support networking between computers? |
A. | Windows 3.1 |
B. | Windows 95 |
C. | Windows 2000 |
D. | Windows NT |
E. | Windows XP |
Answer» A. Windows 3.1 |
199. |
In which type of the following OS, the response time is very crucial : |
A. | Network Operating System |
B. | Real Time Operating System |
C. | Batch Operating System |
D. | Unix Operating System |
E. | None of these |
Answer» B. Real Time Operating System |
200. |
Which of the following languages is more suited to structured program? |
A. | PL/1 |
B. | FORTRAN |
C. | BASIC |
D. | PASCAL |
E. | None of these |
Answer» D. PASCAL |
Done Reading?